skill-eval
Audited by Socket on Feb 21, 2026
2 alerts found:
Obfuscated FileAnomalyThe provided guidance is surface-level and lacks explicit security controls for handling sensitive configuration (DATABASE_URL). To improve security, introduce secret management, runtime validation, safe defaults, and explicit exposure controls. Treat .env carefully and consider using a dedicated secrets manager and environment isolation in deployments.
[Skill Scanner] Skill requests high-risk tools: Bash Best of the three reports, Report 1 provides the most complete and coherent description of the two-layer evaluation workflow, including explicit Phase separation, ground-truth handling, and evaluation artifact flow. The improved assessment confirms the benign nature of the tooling for evaluation purposes, with reasonable security posture (local IO, restricted ground-truth access). Suggested improvements include adding explicit data sandboxing notes, ensuring strict path validation to prevent accidental ground-truth leakage, and documenting error-handling paths for inconsistent sync-report outputs. LLM verification: [LLM Escalated] This skill document describes an internal evaluation workflow and contains no explicit malicious code, external downloads, or credential requests. The primary security concerns are operational: it grants Bash and Task (subagent) capabilities which permit arbitrary command execution and creation of reports. If run-tests.sh, fixture contents, or the invoked doc-code-sync skill are untrusted, or if Task/subagent runtimes are not properly sandboxed (especially with network access), an attacker could